Cyber Security in 2019

  Presented by Fortinet

In today’s quickly evolving technical landscape, defending networks from known and unknown threats is more critical than ever before. Join speaker Cory Sober, Systems Engineering Manager from Fortinet as he discusses how to concentrate the value of your security-related investments towards leveraging cyber security solutions as key business enablers that deliver highly reliable, fast and secure services to end-users no matter their locale, device type or level of security awareness.

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Agile Mindset & Everyday Kanban

  Presented by Erin Kaohelaulii-Brett • Chapter Leader; Women in Agile

The world is changing quicker than we can keep up! The demands for us to constantly innovate, rapidly develop and continuously improve should be at the forefront of every business model. Companies can choose to either Sink, Float or Swim.

  • What are leading businesses doing to adjust to the rapid pace?
  • How can you provide value to your customers quickly and leave the door open for feedback?

In this session, you’ll learn about the Agile Mindset and beneficial tools/techniques that you can use in your everyday life to organize, manage and quickly deliver value to your business.

Gap Analysis: Configuring O365/Azure Environment for NIST800-171 Compliance

  Presented by David Stevens • IT Program Director, Kapiolani Community College

Supply chain cybersecurity scrutiny is increasing across the entire critical infrastructure ecosystem, not just the Department of Defense. This presentation reviews the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments and includes advice for configuring, monitoring, automating and reporting upon shared National Institute of Standards & Technology (NIST) 800-171 controls.

In this session, attendees will learn how to:

  • Evaluate the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments
  • Gather advice for configuring, monitoring, automating, and reporting upon shared NIST 800-171 controls.

Criminal & Hacker Hardware Demos

  Presented by Bob Monroe • Board Member, Institute for Security and Open Methodologies

Curious about the hardware criminals can use? ISECOM will be showcasing and demonstrating different tools easily available to criminals and discussing how to protect against those attacks. Demos will be done throughout the day at the ISECOM table, just outside of Theater 3.

Come see demonstrations of hardware tools hackers use, including:

  • HackRF One
  • Portapack
  • Nooelec Ham It Up Upconverter
  • r00tabega
  • WiFi Pineapple
  • deauther
  • Frequency Radio Signal Counter
  • Rubber Ducky
  • Bad USB
  • NFC jewelry
  • Raspberry Pi Zero W with GPS, XBee, LoRa, WiFi, BLE inside a power strip Raspberry Pi running Kali ESP 8288 boards

Digital Transformation(Dx): Disrupt Your Organization and Drive Competitive Advantage

  Presented by Vladimir Abadzhiev • Director, Enterprise Applications & Data Management; Hawai`i Pacific University

Have an initiative that involves people, process and tools? You have gotten so far; you and your team have worked hard to build a solution in an attempt to transform the “we have always done it this way” culture. And now you hit a roadblock and not sure how to proceed to realize the potential. If you relate to this experience, then this session is for you. We will cover the basic definition and hype around digital transformation (Dx). We will talk about customer experience (Cx) and we will expand on the “new” trends around flipping the human-machine dynamic.

All of this effort will secure executive buy in and generate results beyond your imagination.

Open Forum Q&A as time permits.

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Gone are the days of deciding between a storage solution that can solve either data protection OR primary storage requirements. OneXafe is a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to protect hundreds of VMs in a few clicks? No problem. Want to recover a multi-TB VM in less than a second? No problem. Need an enterprise file serving, archiving, or VMware storage solution? No Problem. Want to seamlessly recover an application in the cloud? No Problem. Attend this seminar session to learn more and see OneXafe in action!

Petabyte Is the New Terabyte: Getting a Handle on Your Ever-Expanding Data

  Presented by Qumulo

Legacy storage solutions weren’t designed for today’s increasing data needs. Everything from Video Surveillance Files, User Files, GIS, Aerial Imagery, PACS Images, Archives, Machine Learning, Genomic Sequencing, to just simple Log Files are growing in size and velocity. Qumulo has designed a distributed files system that is simple to use and can scale cost effectively to address the data growth challenges all businesses are facing today. Join us to learn how easy it can be to manage data at scale with real-time analytics to provide visibility into your data.

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.